Windows Forensics
Windows Forensics
Windows Forensics
Cheat Sheet
Abstract
Embark on your Windows Forensics journey with this essential cheat sheet. Whether
you’re a novice investigator or a seasoned pro, these foundational artifacts will guide
you through the intricate world of Windows system analysis.
Keval Parmar
Digital Forensics and Incident Response
Windows forensics
Table of Contents
4. Windows Registry 12
5. Shell Items 23
7. E-Mail Forensics 30
1
Windows forensics
1. Introduction
When dealing with digital investigations, particularly in the Windows environment, having a
comprehensive understanding of the operating system and its artifacts is crucial. The Windows
Forensics Cheat Sheet serves as a concise guide for forensic analysts, incident responders, and security
professionals. It provides essential information on where to find critical artifacts, interpret them, and
use them effectively during investigations.
The Windows Forensics Cheat Sheet empowers investigators by providing quick access to critical
artifacts and guidance on their interpretation. Whether you’re analysing a compromised system,
responding to a breach, or conducting proactive security assessments, this cheat sheet is an
indispensable resource.
For more detailed information and practical examples, refer to the full cheat sheet and explore the
open-source tools available for Windows forensic analysis.
The incident response process follows a cyclical pattern, allowing organizations to detect, respond to,
and recover from security incidents. Here are the key phases:
1. Preparation:
o Establish incident response policies, procedures, and a dedicated team.
o Identify critical assets, define roles, and create communication channels.
2. Identification:
o Detect and confirm security incidents.
o Gather initial information about the incident’s scope and impact.
3. Containment:
o Isolate affected systems to prevent further damage.
o Preserve evidence while minimizing disruption to business operations.
4. Eradication:
o Remove the root cause of the incident.
o Patch vulnerabilities, eliminate malware, and address security gaps.
5. Recovery:
o Restore affected systems to normal operation.
o Validate that the threat has been neutralized.
6. Lessons Learned:
o Conduct a post-incident review.
o Document findings, update procedures, and enhance security measures.
Remember, the incident response process is iterative. As new information emerges, revisit each phase
to adapt and improve your defences.
2
Windows forensics
Memory is a crucial part of forensic investigations. Most of the volatile data resides into the memory.
• Hibernation (After Windows 2000) is a power-saving feature that uses less energy than sleep.
When your system hibernates, it saves the content in memory onto the hard drive (inside the
“Hiberfil.sys” hidden system file).
• DRIPS (After Windows 8.1) refer to the Deepest Runtime Idle Platform State. It corresponds
to the lowest power state for the System on a Chip (SoC) during Connected Standby or Modem
Standby. Understanding DRIPS helps uncover system behaviour during low-power modes.
DRIPS helps determine the lowest power state of the System on a Chip (SoC) during
Connected Standby or Modem Standby. Forensic analysts can assess the energy-saving
behaviour of devices during these low-power modes. By understanding DRIPS,
investigators gain insights into system behaviour during idle periods. It aids in
reconstructing events, especially when the system is in a low-power state. DRIPS
allows the SoC to wake up for specific events (e.g., network activity, input signals).
Detecting these triggers can reveal hidden activities or unauthorized access.
SleepStudy Report:
It stores last 3 days of records which you can find using this command in CMD–
powercfg /SLEEPSTUDY
Look for the DRIPS histogram within the report. It reveals wake-up patterns during
low-power sessions. typical low-power sessions have sleep time intervals close to 32
seconds. However, if the histogram shows sleep intervals less than one second (closer
to 512 milliseconds), it implies frequent interrupts or hardware components
preventing the system from entering DRIPS.
3
Windows forensics
There are many tools out there to analyse the memory, but Volatility3 provides best utilities to do
memory forensics.
Volatility3: https://www.volatilityfoundation.org/3
Memoryze: https://fireeye.market/apps/211368
Volcano: https://www.volexity.com/company/contact/
First check for the encryption whether drive is encrypted or not. You can use tool called EDD by magnet
to check.
• FTK Imager
• CyLR (Command Line Tool)
• Arsenal Image Mounter
Mount Types:
4
Windows forensics
This is logical mounted image which you can see by mounting it. AD1 & L01 images have no drive
geometry, so they must be mounted logically.
Physical mounted images cannot be view by windows explorer, can be viewed by windows application
that perform Physical Name Querying
5
Windows forensics
As of now, NTFS (New Technology File System) is the default file system used by Microsoft Windows
for storing and retrieving files. It has replaced the older File Allocation Table (FAT) system and offers
several advantages, including support for larger file sizes, improved security, and better performance.
NTFS Cluster:
NTFS Cluster contains two types:
1. Allocated:
a. data block is actively being used by a file.
b. Data exists on file system not deleted.
2. Unallocated:
a. Data block is not being used by a file.
b. Data may or may not exist in the block or cluster.
c. May contain deleted or unused data.
if data is deleted and that space where data was written is not overwritten than it is possible to recover
that data. If user had wiped the hard disk than it is not possible to recover the deleted data. One wipe
is enough to make it not possible to recover.
6
Windows forensics
The Master File Table (MFT) is a very structured database that tracks all the objects to be saved on an
NTFS volume. Every object gets a FILE record within the MFT. It has 1024 bytes long records. The first
24 MFT entries are reserved for special use by the NTFS volume. The first 12 entries are used by system
files that make NTFS work. These files are all named starting with a $ and are hidden from view unless
using specialized tools.
#0 - $MFT: Master File Table. A database that tracks every file in the volume.
#5 - . : Root directory of the disk. Tracks the allocation (in-use versus free) of each cluster in the volume.
#6 - $Bitmap: Tracks the allocation (in-use versus free) of each cluster in the volume.
#8 - $BadClus: Used to mark defective clusters so that NTFS will not attempt to use them.
#10 - $Upcase: Table of Unicode uppercase characters used to assist sorting filenames.
7
Windows forensics
Zone.identifiers:
It will tell you that from where file had come.
• NoZone = -1
• MyComputer = 0
• Intranet= 1
• Trusted= 2
• Internet= 3
• Untrusted= 4
Shadow copy:
Shadow Copy, also known as Volume Snapshot Service (VSS) or Volume Shadow Copy Service, is a
technology included in Microsoft Windows. It allows creating backup copies or snapshots of computer
files or volumes, even when they are in use. Here’s how it works:
1. Snapshot Creation:
• A shadow copy is a snapshot of a volume that duplicates all the data held on that
volume at a specific instant in time.
• Windows periodically crawls the system, looking for file changes made since the
last crawl. It records these changes, creating a history of the file/folder.
8
Windows forensics
• Restoring LUNs (LUN Resynchronization and LUN Swapping): Shadow copies can
be used to restore Logical Unit Numbers (LUNs) efficiently.
• Restoring Individual Files (Shadow Copies for Shared Folders): Allows retrieving
specific files from a snapshot.
• Data Mining: Shadow copies aid in data analysis by providing historical views of
file changes.
• VSS Service: Part of the Windows operating system that ensures components can
communicate and work together.
• VSS Requester: The software (e.g., backup applications) that requests shadow
copy creation.
Examples include Windows Server Backup and System Center Data Protection Manager.
Remember that shadow copies are valuable for data protection and recovery, especially when dealing
with live applications and large data sets. They allow you to back up application data without taking
applications offline, ensuring consistent backups and efficient restores.
• System Snapshot
• Software Installation
• Manual Snapshot
9
Windows forensics
A Solid-State Drive (SSD) is a semiconductor-based storage device that uses integrated circuit
assemblies to store data persistently. Unlike traditional hard disk drives (HDDs), SSDs have no moving
parts.
SSD manufacturers use non-volatile flash memory. SSD's do not require batteries. Non-volatility
allows flash SSDs to retain memory during a sudden power loss. SSD design is proprietary. Most
every detail is proprietary on the format of specifically how data is stored on the SSD.
In SSD reading/writing operation done very quickly and doing same operation to same place again &
again will lead to corruption of hard disk. SSDs have limited number of writes and as a result will need
two different capabilities that are used to help reduce the overall wear and tear of the SSD:
• Wear levelling means if content is change, store it to new location. Every 5 write cycle data
moved to new location. Slack space disappears & you can no longer be sure that the exact
physical location of sector.
• Trim tells OS that which file has been deleted & have free space in it which can be
overwritten.
Data/File Carving:
The Internet Evidence Finder (IEF) searches the selected drive, folder (and sub-folders, optionally),
or file (memory dumps, pagefile.sys, hiberfil.sys, etc.) for Internet artifacts.
10
Windows forensics
There is a lot of metadata of a file which helps us to identify that where, when and by whom file is
created.
EXIFTool: https://exiftool.org/
11
Windows forensics
4. Windows Registry
The Windows Registry is a crucial component of the Microsoft Windows operating system. It serves as
a centralized database that stores a wide range of information, settings, options, and values related to
both software and hardware installed on Windows systems.
The registry is organized in a hierarchical structure with keys and subkeys. Each program or component
installed on your system can create its own subkey within the registry.
• System settings: Such as startup programs, hardware configurations, and user preferences.
• Application settings: Including program-specific configurations.
• Device drivers: Information needed for hardware components to function properly.
• User profiles: User-specific settings and preferences.
Path:
12
Windows forensics
NTUSER.DAT:
Contains user specific settings & configurations. All keys related to user.
USERCLASS.DAT:
Stores information about file associations & default settings for the user.
Which folder user has opened or closed. Aid for virtualized registry root for UAC (user account control).
AMCACHE.HVE
Registry file contains log files also which is helpful to identify whether drive is dirty or not. Dirty hive
doesn’t have every data, when system gets restart it stores data that are in transection logs into registry
hive permanently.
LOG1 file has data that is not written to registry, and it has started writing to registry.
LOG2 file have data means that data has been written to registry, and process of writing is completed.
If LOG1 & LOG2 files are not same, it means hive is dirty.
13
Windows forensics
Each key has last written time so that we can see when the last registry has been changed.
There is Win32 API to timestamp the files but there are no Win32 API to timestamp the registry key.
Users need to make function to do that.
MRUs are most recent used files. which indicates last changes made to registry.
Registry hives have unallocated space similar to file systems. A deleted key is marked as unallocated.
Tools:
Registry acquisition:
• KAPE–https://www.kroll.com/en/services/cyber-risk/incident-response-litigation-
support/kroll-artifact-parser-extractor-kape
• Autopsy – https://www.autopsy.com/download/
• FTK Imager - https://www.exterro.com/digital-forensics-software/ftk-imager
Rgistry Parsing:
RegRipper - https://github.com/keydet89/RegRipper3.0
Registry Forensics:
Last login
Logon count
Password policy
When a user logs in using a Microsoft Live ID, which most non-active directory systems will try and
force you to do, the login count will not increment in our testing. The LiveID used for the login is
stored under the IntemetUserName value. We can check whether password is required for an
account or not using 3rd party tool SAMInside.
14
Windows forensics
SAMinside can be pointed to any specific SAM and SYSTEM hive files and tell you whether there are
passwords set for an account. If you see a <Disabled> entry in the LM- or NT-Password field, then the
hash type is currently turned off.
If you see a <Empty> field next to one of the LM- or NT-Password fields, then a password is not
needed to log in.
ControlSetO0 1 is typically the ControlSet that you just booted into the computer with. This is usually
the most up-to-date version of the ControlSet.
Contro1Set002 is the "Last Known Good" version. This version is the one that is considered good
when the previous boot occurred in case something drastic happened during the current boot cycle.
Considering we are examining the ControlSet not in an active machine, another way to look at this is
that ControlSetO0l would be the last successful boot Of the machine and Contro1Set002 would be
the previous "successful boot" before that.
You can identify by REG_DWORD key that which CurruntControlSet is this, if value is set to 1 that
means this is the CurruntControlSet001.
To determine if last access timestamps are being updated on a system you are examining you can
examine the following registry key.
SYSTEM\CurrentControlSet\Control\FileSystem
Locate NtfsDisableLastAccessUpdate ->If set to 0xl, then access time stamps are turned off.
If the last access timestamp is turned off, we will not be able to see when file data was last accessed
by the system.
Network Interface:
The key's location is found here in the SYSTEM hive:
SYSTEM\CurrentContro1Set\Services\Tcpip\Parameters\Interfaces
it will allow you to see the TCP/IP information configured, the IP address, the gateway, and other
potentially useful information.
If the machine was configured for DHCP, it will contain the DHCP IP address that was assigned, the
subnet mask, and the DHCP server's IP address.
15
Windows forensics
Network Location Awareness (NLA) has been built into Win7 and up to aid the user to identify where
the computer might be connected to adjusting the firewall appropriately.
This also allows for some very unique forensic information to be obtained through this structure.
"First, let's start with what NLA does. For each network interface the PC is connected to, NLA
aggregates the network information available to the PC and generates a globally unique identifier
(GUID) to identify each network.
In other words, it creates a network profile for any network it connects to. The Windows Firewall
then uses that information to apply rules from the appropriate Windows firewall profile.
This allows you to apply a different set of firewall rules depending on which network you are
connected to.
For example, a public network could get a very restrictive set of rules, a home network could get a
less restrictive set of rules, and a managed network could get a set of rules determined by an
administrator."
With NLA, it will show a list of all the networks the machine has ever connected to via their DNS
suffix (for example, sans.org). Identifying intranets and networks that a computer has connected to is
incredibly important.
Investigators will find this key useful due to the fact that in some cases, just by examining this key, it
might be able to give you the geo-location of where this laptop might have been based on identifying
the networks that it attached to and when.
Most info regarding NLA will be stored under the following three places:
HKLM\Software\Microsoft\Windows NT\CurrentVersion\NetworkList
HKLM\Software\Microsoft\Windows\CurrentVersion\HomeGroup
C:\Windows\System32\NetworkList
either 0x47 (hex) for wireless, 0x06 (hex) for wired, or 0xl 7 (hex) for broadband (3g) networks.
The "Category" value specifies what type of network the user chose when selecting the network
profile.
http://wigle.net/
When user is not connected to network, and they want to access network files at that time CSC is
useful.
Users need to select offline file access mode so that OS will copy all files into local system, these
cached copies named offline flies.
16
Windows forensics
• CSCFlag = 0: Default option means that the user must specify which files he would like to be
cached.
• CSCFlag = 16: For automatic document caching, "All files and programs that users open from the
shared folder are automatically available offline" with the "optimize for performance" unchecked.
• CSCFlag = 32: For automatic program caching. Same as above, but with "Optimize for performance”
checked.
• CSCFlag = 2048: Default Win7-lO setting until user disables the "Simple File Sharing" or uses the
• 1 = Printer
• 2 = Device
• 3 = IPC
What is SHIMCACHE?
Application compatibility checking within windows OS. Checks to see if applications to be “Shimmed”
to run application on currentOS or via olderOS parameters.
AppCompactCache will track the executable file’s last modification date, file path and if it was
executed.
It is for windows 10 only. It provides full path of the execution file and also last execution date.
17
Windows forensics
Registry keys:
System Information:
OS Version:
• SOFTWARE\Microsoft\Windows NT\CurrentVersion
• HKLM\SYSTEM\CurrentControlSet
• SYSTEM\Select\Current
• SYSTEM\Select\LastKnownGood
Computer Name:
• SYSTEM\CurrentControlSet\Control\ComputerName
• SYSTEM\CurrentControlSet\Control\TimeZoneInformation
• SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces
• NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Run
• NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\RunOnce
• SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
• SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
• SOFTWARE\Microsoft\Windows\CurrentVersion\Run
• SYSTEM\CurrentControlSet\Services
o Ifstart value is set to 0x02, then service will start at boot.
• SAM\Domains\Account\User
Shutdown Information
• SYSTEM\CurrentControlSet\Services\bam\UserSettings\{SID}
• SYSTEM\CurrentControlSet\Services\dam\UserSettings\{SID}
External Devices:
Device identification:
• SYSTEM\CurrentControlSet\Enum\USBSTOR
18
Windows forensics
• SYSTEM\CurrentControlSet\Enum\USB
First/Last Times:
• SYSTEM\CurrentControlSet\Enum\USBSTOR\Ven_Prod_Version\USBSerial#\Properties\{83d
a6326-97a6-4088-9453-
o a19231573b29}\####
o Oo64=first connection
o 0066=last connection
o 0067=last removal
Program Execution:
Last Command Executed in Run:
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Search\RecentApps
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{GUID}\Count
For XP/VISTA:
Win7 +:
19
Windows forensics
XP -> SYSTEM\CurrentControlSet\Control\SessionManager\AppCompatibility\AppCompatCache
SYSTEM\CurrentControlSet\Control\SessionManager\AppCompatCache\AppCompatCache
AmCache.hve\Root\File\{Volume GUID}\######
File/Folder Usage:
Recent Files:
• NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
• NTUSER.DAT\Software\Microsoft\Office\VERSION
• NTUSER.DAT\Software\Microsoft\Office\VERSION\UserMRU\LiveID_####\FileMRU
ShellBags:
• USRCLASS.DAT\Local Settings\Software\Microsoft\Windows\Shell\Bags
• USRCLASS.DAT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
• NTUSER.DAT\Software\Microsoft\Windows\Shell\BagMRU
• NTUSER.DAT\Software\Microsoft\Windows\Shell\Bags
• NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePI
DlMRU
• NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedP
idlMRU
• NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths
• NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery
Network Behaviour:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList
• \Signatures
o \Unmanaged (record DefaultGatewayMac, DnsSuffix, FirstNetwork (SSID),
ProfileGuid)
o \Managed
20
Windows forensics
• \Nla
o \Cache
• Profiles
Most info regarding NLA will be stored under the NetworkList key above, and also:
• HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\HomeGroup
• HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles\{GUID}
Network Types:
• 0x06 = Wired
• 0x17 = Broadband
• 0x47 = Wireless
Category:
• 0 – Public
• 1 – Private
• 2 - Domain/Work
21
Windows forensics
• HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shared
TaskScheduler - Malware may add entries under this key to run code when the Windows
Explorer starts.
• HKEY_CURRENT_USER\Control Panel\Desktop\SCRNSAVE.EXE - Malware can modify this
value to set a screensaver executable that contains malicious code.
22
Windows forensics
5. ShellBags Item
ShellBags:
• What Are Shellbags?
o Shellbags are a set of registry keys that contain details about a user’s viewed
folders.
o These details include information such as:
▪ Folder size.
▪ Position (where the folder appears on the screen).
▪ Icon associated with the folder.
o Essentially, shellbags track and maintain a history of directory traversal within
the registry.
23
Windows forensics
Tool:
LEcmd.exe – LNK Explorer Command line edition by ERIC Zimmerman
Jumplist:
It is a recent file that user have last accessed. There are two types of Jumplists are there.
Automatic jumplist is created automatically when the user opens a file or application.
Custom jumplist created when user pins a file or application to Taskbar or start menu.
When user starts any program from start menu entry will be added to the Jumplist.
24
Windows forensics
When you parse a jumplist it will show Application ID rather than name of application this id remains
same in every device. Following list contains some of the famous applications and their IDs.
25
Windows forensics
Tool:
JLEcmd.exe
26
Windows forensics
6. USB Forensics
USB forensics plays a crucial role in Windows forensics, and here’s why it’s important:
• Valuable Evidence Source: USB devices are ubiquitous in our digital lives. People use them
for data transfer, storage, and communication. As a result, investigating USB artifacts
becomes crucial during digital forensic examinations. These artifacts provide valuable
evidence about user activities, file transfers, and system interactions. By analysing USB-
related data, investigators can gain insights into how external devices were used and their
potential involvement in criminal activities or security incidents.
• Role in White-Collar Crimes: USBs play a significant role in white-collar crimes. Whether it’s
corporate espionage, data theft, or unauthorized access to sensitive information, USB
devices are often at the center of such activities. Seizing USB devices during forensic
investigations allows us to understand their role in potential criminal acts. By examining USB
artifacts, we can trace the connections between devices, files accessed, and user behaviour.
• Artifact Locations and Interpretation: The Windows operating system maintains a record of
USB device history in various locations, including the Windows registry and system files.
These artifacts reveal when a USB device was connected, which specific device it was, and
whether any data transfers occurred. For instance, the Event Viewer logs USB-related events,
providing timestamps for device insertion and removal. Additionally, the registry contains
information about the last plugged-in USB storage devices. Properly interpreting these
artifacts helps reconstruct timelines and understand the context of USB device usage.
27
Windows forensics
USBSTOR:
PATH: SYSTEM/CurruntControlSet/Enum/USBSTOR
PATH: SYSTEM/CurruntControlSet/Enum/USB
DEVICE WITHOUT A UNIQUE SERIAL NUMBER WILL HAVE AN “&” IN THE 2nd CHARACTER OF SERIAL
NUMBER.
SYSTEM\MountedDevice
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
SYSTEM\CurrentControlSet\Enum\USBSTOR\Ven_Prod_Version\USB
iSerial#\Properties\{GUID}\####
It will give 64-bit Hex Windows Time which you can parse using – DCode Tool https://www.digital-
detective.net/dcode/
28
Windows forensics
Setupapi.log:
XP -> C:\Windows\setupapi.log
You can see this log file using any text editor tool.
You can also look into Event Logs to track time of removable devices.
On Win7+ this key may not be populated if the internal drive is an SSD. This is created when a
filesystem is initially formatted.
This key is traditionally used for ReadyBoost (Readyboost is used to make flash memory as caching
database between hard disk and RAM.) but is disabled if the system is an SSD.
ReadyBoost is a Windows program that caches frequently used files. It leverages free space on fast
removable devices, such as flash drives, CompactFlash memory cards, and Secure Digital (SD) cards,
to augment system memory. The primary goal is to enhance overall performance without requiring
users to purchase additional hardware. RAM significantly influences system speed, so ReadyBoost
helps by fetching frequently used files from the flash drive instead of relying solely on RAM.
SOFTWARE\Microsoft\Windows NT\CurrentVersion\EMDMgmt
Tool:
There is a tool to automate the USB device forensics.
USBDeviceForensics - https://github.com/woanware/usbdeviceforensics
29
Windows forensics
7. E-Mail Forensics
E-mail forensics is a critical field within digital forensics. Email communication is a common vector for
cybercrimes such as phishing, fraud, and data breaches. Forensic experts analyse email evidence to
trace the origin, identify malicious actors, and understand the attack vectors. In legal cases, emails
serve as crucial evidence. Intellectual property theft, harassment, and insider threats can be
detected through email forensics. Corporations investigate employee misconduct, policy violations,
and unauthorized data sharing. Email trails help reconstruct events, timelines, and interactions.
Investigating insider threats, data leaks, or sensitive information exposure relies on analysing email
content. Email headers, metadata, and content provide clues for authentication. Determining the
authenticity of an email or identifying the sender is crucial. Malicious attachments or links in emails
can lead to malware infections. Forensic experts analyse email attachments, URLs, and payloads to
understand the attack. Email forensics ensures adherence to privacy and security standards.
30
Windows forensics
E-Mail Authentication:
Verifies that message content has not changed via digital signature.
Valid SPF & DKIM increase trust in other parts of the header.
What is Message-ID?
According to RFC 2822, the standard for email format, each email should have a globally unique
identifier called Message-ID. The Message-ID is a critical field in the email header. It comprises a long
string of characters that ends with the Fully Qualified Domain Name (FQDN). Message IDs are
generated by client programs that send emails, such as Mail User Agents (MUA) or Mail Transfer
Agents (MTA).
Message-IDs can be used to identify related E-Mails via the optional References and IN-Reply-To
fields.
31
Windows forensics
• Additional timestamp
o MAPI-Client-Submit-Time (Local System Time)
o MAPI-Conversation-Index (times of other messages in thread)
• Additional unique identifiers
o MAPI-EntryID
• Information on actions taken on message.
o MAPI-message-Flags
o Pr_Last_Verb_Executed (read, replied, forwarded, etc.)
32
Windows forensics
Microsoft Outlook:
File Extension:
.PST
Path:
%USERPROFILE%\AppData\Local\Microsoft\Outlook (outlook 2010 and earlier)
Registry key:
HKEY_CURRENT_USER\Software\Microsoft\WindowsNT\CurrentVersion\Windows
Messaging\Subsystem\Profiles\Outlook
Here’s how you can switch between working offline and online in Outlook:
You can also adjust how much email data is available when working offline:
Select your Exchange or Microsoft 365 account and click Change. Under Offline Settings, adjust the
slider to choose the desired amount of time (e.g., all, 12 months, 6 months, 3 months, or 1 month).
Note that Cached Exchange Mode must be turned on for this feature to work. By default, Outlook
synchronizes 12 months of email data, but you can customize this setting.
Most account types, including IMAP, Microsoft 365, Exchange, and Outlook.com, use an Offline
Outlook Data File (.ost).
An .ost file stores a synchronized copy of your mailbox information on your local computer. It allows
you to work with the contents of an Exchange folder even when you’re offline. The next time you
connect to the Exchange server, the offline folders are automatically synchronized with the server.
33
Windows forensics
drive:\Users\user\AppData\Local\Microsoft\Outlook
Outlook uses a “Secure Temp Folder” to open an attachment. Previewed and opened attachments
can be recovered. Prior to Outllook 2007, attachments persisted util disk cleanup. In OutLook2007+
attachments remains only if message or Outlook is closed before the attachment or in the event of
application crash.
Path:
%APPDATA%\Local\Microsoft\Windows\INetCache\Content.outlook
E-Mail Encryption:
Email encryption ensures that the content of your emails remains confidential and secure during
transmission. When you send an encrypted email, only the intended recipient (who possesses the
decryption key) can read its contents. Even if intercepted, the email appears as gibberish to
unauthorized parties.
• S/MIME provides end-to-end encryption for individual emails. It uses digital certificates to
sign and encrypt messages.
• When you send an S/MIME-encrypted email, the recipient’s email client decrypts it using
their private key. S/MIME requires both the sender and recipient to have valid certificates.
34
Windows forensics
• PGP is another method for end-to-end email encryption. It uses public-key cryptography.
• With PGP, you generate a key pair (public and private keys). You share your public key with
others, and they can use it to encrypt messages to you.
• Only you can decrypt these messages using your private key. PGP is widely used for secure
email communication.
E-Mail Server:
An email server, also known as a mail server, is a software program responsible for sending and
receiving email messages between mail clients.
It acts as a virtual post office, handling the distribution of incoming mail to local users and sending
out outgoing messages.
Most corporate environments employ dedicated mail servers, also can be hosted offsite or cloud.
Because of massive amount of data and business considerations it makes forensics copies difficult to
make, you may require specialized tools.
Microsoft Exchange:
Microsoft Exchange is an email and collaboration platform that provides business-class features for
organizations. It offers both hosted (cloud-based) and on-premises solutions. Key features include
email, calendars, contacts, tasks, and more. Exchange might be broken up into multiple storage
groups, each with multiple .EDB database. Mail box can be exported in .PST file format.
Extension:
.EDB: stores mail, attachments, contacts, Journal, Notes, Tasks, calendar & address book entries.
35
Windows forensics
36
Windows forensics
Tools:
F-Response - https://www.f-response.com/
37
Windows forensics
8. Additional Artifacts
Windows Search Database:
Windows Search plays a crucial role in helping users find files, emails, and other content on their
Windows systems. The Windows Search database stores information related to indexed files,
directories, and more.
As forensic investigators, understanding this database can provide valuable insights during
investigations. Windows Search uses the Extensible Storage Engine (ESE) to store its data.
Interestingly, ESE is the same engine that Microsoft Exchange utilizes for its databases. However, due
to the proprietary nature of ESE, limited information is available in the public domain about its
structure and forensic analysis.
Path:
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb
Tools:
Libesedb - https://github.com/libyal/libesedb
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-
2012/hh875546(v=ws.11)
38
Windows forensics
Thumbnails:
By default, Windows displays thumbnails for various file types, including images, videos, and
documents.
Thumbnails are miniature representations of the actual content, allowing you to quickly identify files
without opening them. However, sometimes you might encounter issues where thumbnails don’t
display correctly or appear as default icons.
It stores thumbnails in thumbs.db. it catalogues pictures in a folder and stores a copy of the
thumbnails even if the picture were deleted.
Location:
WinXP: automatically anywhere.
Win7/8/10: automatically created anywhere accessed via a UNC (Universal naming Convention) path
Thumbcache:
Win7/8/10 Thumbcache Path:
C:\Users\<username>\AppData\Local\Microsoft\Windows\Explorer\
Thumbcache_32.db
Thumbcache_96.db
Thumbcache_256.db
thumbcache_1024.db
Tools:
ThumbsDBViewer - https://thumbsviewer.github.io/
ThumbCacheViewer - https://thumbcacheviewer.github.io/
39
Windows forensics
Recycle Bin:
The Recycle Bin is a familiar icon you’ll find on your Windows desktop. It serves as a temporary
storage area for files and folders that you’ve deleted from your computer.
When you delete something (whether intentionally or accidentally), it doesn’t immediately vanish
forever. Instead, it goes to the Recycle Bin. Think of it as a safety net – a second chance to recover
files before they’re permanently removed.
When you delete a file or folder, it’s moved to the Recycle Bin. The file still occupies space on your
hard drive, but it’s no longer visible in its original location.
If you change your mind or realize you deleted something by mistake, you can open the Recycle Bin,
find the item, and restore it. However, if you empty the Recycle Bin (either manually or
automatically), the files are permanently deleted.
Path:
C:\$Recycle.bin – Vista\Win7\Win8\Win10
Deleted time and original filename contained in separate files for each deleted recovery file.
C:\Recycler – 2000\NT\XP\2003
Win7/8/10 $Recycle.Bin:
Under $recycle.bin and SID Files preceded by,
Tools:
RBCMD: https://github.com/EricZimmerman/RBCmd
40
Windows forensics
Windows10 timeline:
Tools:
WxTCmd.exe by Eric Zimmerman - https://github.com/EricZimmerman/WxTCmd
Windows Prefetch:
Maybe there will be 10 sec differences between actual run time and prefetch time.
Tools:
PECmd.exe by Eric Zimmerman - https://github.com/EricZimmerman/PECmd
Pf.exe - https://www.nirsoft.net/utils/win_prefetch_view.html
41
Windows forensics
SRUM:
System Resource Usage Monitor (SRUM) is a feature introduced in Windows 8 and later versions. It
tracks resource usage by applications and services on a Windows system. SRUM collects data on
resource utilization, such as CPU, memory, network, and disk usage. It helps administrators analyse
system performance and resource consumption over time.
SRUM records usage data in a database called the SRU (System Resource Utilization) database. The
database stores information about processes, network connections, and energy consumption.
Path:
Registry - SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SRUM\Extensions\
C:\Windows\System32\SRU\
Tools:
ESE Database View – https://www.nirsoft.net/utils/ese_database_view.html
SRUMMonkey - https://github.com/devgc/SrumMonkey
42
Windows forensics
9. Eventlogs:
An event log is a structured file that contains records of various events occurring on a computer
system, application, or device. Think of it as a detailed journal that documents actions, errors, and
other noteworthy occurrences.
43
Windows forensics
Path:
NT\Win2000\XP\Server 2003:
Vista\ Win7\8\2008\2012\win10\2016:
44
Windows forensics
2. RDP:
45
Windows forensics
46
Windows forensics
5. Time Manipulation:
Tools:
EventLogExplorer - https://www.eventlogxp.com/
EventLogView - https://www.nirsoft.net/utils/full_event_log_view.html
EvtxECmd - https://www.sans.org/tools/evtxecmd/
47
Windows forensics
Cached Files: These can include downloaded images, videos, documents, executables, and scripts.
Form Data: Includes search queries, logins, passwords, and other input data.
Browser forensics plays a crucial role in incident response, helping investigators understand how
attacks on computers or networks originated and identifying the source of compromise.
Google Chrome: Known for its speed, extensions, and memory consumption. It also offers Incognito
mode to prevent permanent storage of history, cookies, and form data.
Mozilla Firefox: commonly known as Firefox, is a free and open-source web browser developed by
the Mozilla Foundation and its subsidiary, the Mozilla Corporation.
48
Windows forensics
Internet Explorer
49
Windows forensics
50
Windows forensics
Cookie Metadata:
Metadata remains constant but location changes:
Index.dat (IE4-IE9)
51
Windows forensics
52
Windows forensics
53
Windows forensics
Tools:
Structured storage viewer - https://www.mitec.cz/ssv.html
ParseRS - https://github.com/jtmoran/parseRS/tree/master
54
Windows forensics
55
Windows forensics
EDGE
56
Windows forensics
Firefox
Path:
History-Cookies-Bookmarks-Auto-Complete
%USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profile\<Rnadom text>.default.
Cache:
%USERPROFILE%\AppData\Local\Mozilla\Firefox\Profiles\<random text>.default\Cache
57
Windows forensics
Tool:
NirSoft: MZHistory View - https://www.nirsoft.net/utils/mozilla_history_view.html
58
Windows forensics
59
Windows forensics
60
Windows forensics
61
Windows forensics
Google Chrome
62
Windows forensics
63
Windows forensics
Tools:
64
Windows forensics
65
Windows forensics
Tools:
66
Windows forensics
67